Chinese Smishing Campaign | How a Large-Scale Phishing Kit Is Targeting 80+ Brands Across 20 Countries

Chinese

TL;DR

We have been tracking a large-scale Chinese smishing campaign targeting multiple regions and industries with primary focus on telecom providers, toll road system, postal services and banks.

The campaign relies on SMS-delivered phishing links that redirect victims to impersonation pages, designed as unpaid tolls, delivery issues, prizes or account-related actions. Victims are guided through a multi-step flow designed to harvest personally identifiable information (PII), payment card data, and 2FA codes.

The operators can push real-time instructions via WebSocket-based communication to dynamically control the victim session, including redirecting the victim browser to 2FA pages to capture one-time passwords (OTPs) and complete fraudulent transactions in real time.

Infrastructure analysis shows around half of the campaign’s infrastructure is behind Cloudflare. Hosting is distributed primarily across Singapore, the United States, and Japan. The most commonly abused TLDs include .cc, .icu, .com, .top, and .life, with .cc and .icu representing over 50% of the observed domains.

The campaign uses consistent JavaScript files and API endpoints, which we used for pivoting and infrastructure expansion. Analysis of the code, API responses, and operator panel activity reveals consistent Chinese-language elements, which makes us believe that this phishing campaign is likely associated with a Chinese-speaking threat group.

Campaign Attack Chain

A large-scale Chinese smishing campaign has been observed targeting users across multiple regions and industries. The campaign primarily focuses on telecom providers, toll road systems, postal and logistics services, and financial institutions, with additional targeting observed across government portals, e-commerce platforms, and travel-related services.

  • Initial Access: The campaign relies on SMS-based phishing (smishing) messages containing urls that impersonate legitimate services. These messages typically reference urgent scenarios such as unpaid tolls, delivery failures, prize claims, or account verification requirements. Once accessed, victims are redirected to phishing pages designed to mimic trusted brand payment portals.
  • Execution: Upon accessing the phishing page, the kit performs device fingerprinting and retrieve configuration data from the backend which determines the page behavior
  • Defense Evasion: The campaign implements IP and BIN-based filtering mechanisms to screen victims before progressing further. If the victim’s IP address is found in the blacklist, access is immediately terminated. If the victim’s bin card is in the blacklist, the payment fails.
  • Collection & Credential Access: The phishing campaign uses a multi-step interaction flow that collects victim data, starting from basic inputs such as email address, phone number, vehicle plate number, etc., followed by payment form pages that captures full card details.
  • Command and Control (C2): For C2 it relies on a persistent WebSocket-based communication channel that enables real-time interaction between operators and victims. Through this channel, operators can send 33 distinct commands to control the victim session and modify the phishing flow.
  • Exfiltration: Collected data is transmitted to the command-and-control infrastructure through encrypted HTTP POST requests
  • Final Step: Upon completion of the phishing flow or operator-triggered success condition, the victim is redirected to a legitimate website specified in the phishing kit configuration

Chinese

Targeted Industries

The phishing campaign targets a wide range of industries, with the following sectors ranked from most to least frequently impersonated based on observed campaign volume.

  • Telecom & Mobile: Mobile network operators and regional telecommunications providers across North America, Europe, Latin America, and Asia-Pacific (T-Mobile, Verizon, AT&T, Tigo Telecom, Orange Polska)

  • Toll Roads & Road Fees: Electronic toll collection systems, road usage payment platforms, and traffic violation services across the United States, UAE, Latin America, and Asia-Pacific (TxTag, Florida DHSMV, Salik, DARB, ENA Corredores, TAG Chile, India eChallan)

  • Postal & Parcel Delivery: National postal operators and international courier services across North America, Europe, Latin America, UAE and Asia-Pacific (USPS, Australia Post, PostNord, Emirates Post, Correios Brazil, India Post, La Poste, PostNL, Ninja Van, J&T Express, Purolator)

  • Banking & Financial Services: Retail banks, digital banking platforms, and financial institutions across the United States, Europe, Asia-Pacific, and Australia (Macquarie Bank, CommBank, Westpac, NAB, ANZ, BCA, Rakuten Bank, Raiffeisen Bank, Santander Mexico, Banco Cuscatlan)

  • Airlines & Travel: Commercial airlines and travel-related service providers (Qantas Airways)

  • Government & Tax: Government agencies, public service portals, and tax/payment systems across multiple regions (DMVs across U.S. states, Dubai Customs, TAMM, UK GOV.UK services, e-Tax Japan, Kemnaker Indonesia, NZTA)

  • E-commerce & Retail: Large-scale retail chains and e-commerce platforms across global markets (Coles, Migros, Amazon Japan, Apple Japan)

  • Brokerage & Investment: Online trading platforms and investment service providers (E*TRADE, Robinhood)

Targeted Brands

The phishing campaign impersonates a wide range of brands across multiple regions. The United States is the most heavily targeted country, accounting for the largest share of impersonated brands across telecom, DMV, toll, postal, and financial verticals. The United Arab Emirates ranks as the second most targeted country, with focused campaigns against toll road platforms, customs, and government service portals.

  • United States: T-Mobile, Verizon, AT&T, Texas DMV / TxTag, Florida DHSMV, California DMV, Michigan SOS, Missouri DOR, Virginia DMV, Ohio BMV, Georgia DDS, USPS, Maryland MVA, UPS (Parcel Delivery), Illinois SOS, DHL, Massachusetts RMV, Pennsylvania DOT, Nebraska DMV, New York DMV, New Hampshire DMV, NYC CityPay, Chicago CHIPAY, City of Los Angeles Payment, Louisiana OMV, Indiana BMV, New Jersey MVC, North Carolina DMV, Utah DMV, E*TRADE, Robinhood
  • United Arab Emirates: DARB Toll Road Platform, Salik Road Toll System, Emirates Post, Dubai Customs, TAMM, Parkin.
  • Australia/NZ: Qantas Airways, Macquarie Bank, CommBank, Westpac Bank, NAB Bank, ANZ Bank, Bankwest, Suncorp, Bank of Queensland (BOQ), Up Bank, ubank, HSBC Bank (AU), Australia Post, NZTA / Waka Kotahi (NZ Toll), Coles.

  • Europe: PostNord (Denmark/Sweden), DPD Parcel, Migros Supermarket (Switzerland), UK GOV.UK Winter Fuel Payment, UK GOV.UK Parking Fine, UK DVSA (Road Fines), Eurobank, PTT Turkish Post, Correos – Spanish Post, La Poste (France), Orange Polska (Poland), bpost (Belgium), PostNL (Netherlands), InPost (Poland), Endesa – Energy (Spain), Raiffeisen Bank (Switzerland), CTT Post (Portugal), Banca Intesa (Serbia), Pošta Srbije (Serbia).

  • Latin America: Visa (Panama), Mastercard (Panama), Santander Mexico, Correo de Mexico (Gob MX), ENA Corredores – Toll Road (Panama), TAG Toll Road (Chile), Banco Cuscatlan (El Salvador), Correios (Brazil), Tigo Telecom (Honduras / Panama).
  • Asia Pacific: JCB / MyJCB Credit Card (Japan), BCA / Bank Central Asia (Indonesia), India eChallan / Ministry of Road Transport, METI/ANRE Energy Agency (Japan), Ninja Van Malaysia, India Post, Intelcom Parcel (Canada), Rakuten Bank (Japan), e-Tax NTA (Japan), Amazon Japan, Apple Japan, Ninja Xpress (Indonesia), J&T Express (Indonesia), Kemnaker – Ministry of Manpower (Indonesia), Purolator Parcel (Canada).

This campaign demonstrates how convincingly threat actors can replicate trusted brands at scale. If your organization’s name, domain, or visual identity is being used in phishing and brand impersonation attacks, you may not know until customers start reporting it. DeXpose’s Brand Protection service monitors for lookalike domains, phishing pages, and impersonation infrastructure targeting your brand  before your cstomers become victims.

Phishing Flow Overview

The investigation was initiated following client reports of SMS messages received as part of an SMS phishing (smishing) campaign. The messages contained links delivered via SMS from multiple phone numbers, impersonating the official DARB (Abu Dhabi Tolling System) platform.

Chinese

The URL impersonates the DARB platform login page and presents itself as a portal for querying unpaid highway toll fees. It requests users to enter their vehicle plate number and mobile number.

Chinese
After entering the vehicle plate number and phone number, a “Toll Violation Notice” is displayed, showing an outstanding amount of AED 4.00.

The page warns that failure to complete payment within the specified timeframe may result in increased fees, referral to a collection agency, and suspension of vehicle registration.

darb-phishing-screenshot-1After clicking “Continue,” the user is redirected to a payment form requesting card details.

Chinese

Campaign Infrastructure Analysis

Approximately half of the campaign’s domains were observed behind Cloudflare, while the remaining infrastructure was distributed across several network providers and autonomous systems, including Alibaba (US) Technology Co., Ltd. (AS45102) and Tencent (AS132203).

We also observed Nginx and OpenResty across the campaign infrastructure.

Chinese

Domains Involved in the Campaign

Across all domains associated with this phishing campaign, our team identified the use of several top-level domains (TLDs). The most frequently observed TLDs were: “.cc,” “.icu,” “.com,” “.top,” and “.life.”

Notably, “.cc” and “.icu” together represented more than 50% of all domains used in the campaign.

Chinese

Geolocation of the Phishing Infrastructure

Analysis of the campaign’s hosting infrastructure shows that the majority of associated IP addresses are geolocated in Singapore and the United States, representing 43.88% and 32.12% of the infrastructure respectively. This is followed by Japan, which represents 14.42% of the observed IP distribution. A smaller portion of the infrastructure is spread across other regions, including Indonesia (3.04%) and Hong Kong (2.42%), with the remaining 4.13% distributed across various other countries.

Chinese

Inside the Phishing Kit

This phishing kit consistently relies on six JavaScript files: common.js, axios.js, vue.js, main.js, check.js, and ws-worker.js as well as API endpoints: getSyncSettings, addClick, addCvv and the_final_interface, and others. These files and endpoints are present across nearly all domains in the campaign.

Chinese

main.js

Main.js (and other JS files) are obfuscated with a a multi-layered obfuscation strategy consistent with a known JavaScript Obfuscator (obfuscator.io). At its core, string literals are extracted into a dynamically accessed array and decoded at runtime using a Base64-based decoder combined with decodeURIComponent, which makes it hard for static string analysis.

It uses control flow flattening to hide the true execution order by restructuring sequential logic into dispatcher-based loops, which makes the program flow difficult to follow during analysis. Also, it has anti-tampering and anti-debugging mechanisms, using prototype-based checks that validate function.toString() output against a regular expression to detect debugging tools or modified execution contexts.

In addition, identifiers are renamed to obfuscated formats, numeric values are represented in hexadecimal, and remaining string literals are fragmented.

To deobfuscate the files, a dedicated tool that reverses Obfuscator.io’s transformations can be used, such as obf-io.deobfuscate.io.

 

Obfuscator.io-Deobfuscator-Brave

Device fingerprinting

When a victim accesses the phishing domain, the kit does device fingerprinting, where the IP address is collected using IP-related APIs and normalized into a unified schema {ip, country, latitude, longitude}. Additionally, it gathers device and environment details such as OS, browser info, user agent, time zone, and language.

IP & BIN Blacklist

The phishing kit includes IP and BIN blacklists (retrieved from /api/open/getSyncSettings). When a victim accesses the phishing URL, the kit compares the victim’s IP address against the blacklist, if a match is found, the access to the site is denied.

Chinese

The IP blacklist also includes labels indicating the reason (in Chinese) for blocking each IP.

Chinese English Translation
完成支付 Complete payment
手动拉黑 Manually block
人机验证失败 Human-machine verification failed

When a user enters a card with a blacklisted BIN, the phishing site automatically declines the payment and shows the message:
“This card type isn’t supported. Please try another card or payment method.”

Chinese

Real-Time Operator Commands

The operator panel can push real-time instructions via WebSocket-based communication to redirect the victim’s browser. For example, the operator can redirect the victim to a verification page to capture a real-time 2FA code. A total of 33 different instructions were identified, with the most important including:

DeXpose

d_sms_bank.html

Simulates Abu Dhabi Commercial Bank (ADCB) 2FA SMS verification.

Chinese

g_app.html

Simulates a bank payment processing flow, instructing victims to approve a transaction through a mobile banking application.

Chinese

f_pin.html

Simulates a payment verification step, prompting victims to enter a 4–6 digit PIN to authorize the transaction.

Chinese

e_email.html

Simulates an email-based payment authentication step, prompting victims to enter a 6-digit verification code sent to their registered email address.

Chinese

common.js

The common.js file defines several fields; however, the two key fields that we are interested in are projectName and errorJumpAddress. The projectName field acts as an internal identifier or tag for the impersonated entity. For domains impersonating DARB, this field has the value AE-FANDAN-DARB, which refers to the United Arab Emirates (AE) and the DARB toll system.

The errorJumpAddress field specifies the legitimate URL of the impersonated entity and is used to redirect victims after a payment is completed. In this case, it redirects to https://darb.qmobility.ae/RucWeb/tolling-policies.

Chinese

ws-worker.js

The ws-worker.js is responsible for maintaining a persistent, real-time communication channel between the victim’s browser and the operator’s C2 infrastructure.

The script establishes a WebSocket connection to the C2 server via the /webSocket/QT endpoint and keeps it alive via a heartbeat every 5 seconds. If a heartbeat_ACK isn’t received within 3 seconds, it force-closes and reconnects.

It specifically listens for binLookupResult and binQueryResult message types, which allows the operator to check the victim’s card details in real time.

A secondary polling loop runs in parallel, querying /api/open/getPendingInstruction endpoint every 2 seconds using the victim’s cvv_id as a session identifier. This acts as a fallback channel in case the WebSocket drops.

All HTTP communication through the polling channel is is encrypted using AES-CTR with a freshly generated random 32-byte key and 16-byte IV per request. The key and IV are embedded within the ciphertext, and the entire blob is transmitted as application/octet-stream.

getSyncSettings & addClick API endpoints

The phishing domain fetches the /api/open/getSyncSettings API to retrieve the configuration of the phishing kit, which determines its behavior. It includes settings such as bin_blacklist (used to block specific card BINs) and ip_blacklist (used to block certain IP addresses), etc.

Chinese

When a user clicks on the phishing domain, the /api/open/addClick endpoint sends the victim’s IP address and the accessed phishing domain, along with other data. If success it returns {“status”:”success”,”code”:200,”data”:null,”msg”:”操作成功”}. The message “操作成功” translates to “Operation Successful” in Chinese.

Exfiltration

The exfiltration is performed through two API endpoints: /api/open/addCvv and /api/open/the_final_interface.

Data harvested from the phishing pages is stored within the cvvform structure and sent in encrypted form to /api/open/addCvv on every form submission, including personal information, credit card details, and PIN code pages.

When the victim reaches the “Thank You” page (z_thank.html), indicating a successful payment flow, or when the operator issues a to_success instruction, the kit sends a final POST request to /api/open/the_final_interface. This request contains the fully accumulated cvvform data in encrypted form.. After that, the victim is redirected to the legitimate domain specified in the errorJumpAddress field within common.js.

Exfiltrated Data Structure (cvvform):

{
"id": "",
"firstname": "",
"lastname": "",
"fullname": "",
"country": "",
"state": "",
"city": "",
"postcode": "",
"address1": "",
"address2": "",
"phoneNumber": "",
"email": "",
"email_pwd": "",
"two_factor_authentication": "",
"gender": "",
"ssn": "",
"dob": "",
"passport_number": "",
"license_number": "",
"medical_number": "",
"ssn_img": "",
"ssn_handheld_img": "",
"passport_img": "",
"passport_handheld_img": "",
"license_img": "",
"license_handheld_img": "",
"medical_img": "",
"medical_handheld_img": "",
"cvv_fullName": "",
"cvv_cardnumber": "",
"cvv_expiry": "",
"cvv_cvv": "",
"cvv_frontImg": "",
"cvv_backImg": "",
"cvv_handheld_img": "",
"cvv_brand": "",
"cvv_type": "",
"cvv_category": "",
"cvv_issuer": "",
"cvv_country": "",
"cvv_pin": "",
"ip": "",
"device": "",
"language": "",
"timeZone": "",
"userAgent": "",
"cookie": "",
"source": "",
"extraJSON": "",
"web_login_account1": "",
"web_login_pwd1": "",
"web_login_type1": "",
"web_login_account2": "",
"web_login_pwd2": "",
"web_login_type2": "",
"web_login_account3": "",
"web_login_pwd3": "",
"web_login_type3": "",
"paypal_login_account": "",
"paypal_login_pwd": "",
"operator_by": "",
"update_time": "",
"state1": "",
"state2": "",
"state3": "",
"operational_status": "",
"current_page": "",
"online_status": "",
"custom_phone": "",
"custom_email": "",
"custom_news": "",
"operation_code": "",
"release_code": "",
"latitude": "",
"longitude": "",
"card_submission_type": "",
"belong_to_template": "",
"custom_form_data": ""
}

Chinese Indicators in Operator Activity

We analyzed the phishing kit’s JS files and endpoint responses, we found that the kit sends status strings to the operator in Chinese, we suggest that the operator may be working through a Chinese-language control panel.

Chines Smishing campaignExamples of these status strings include:

Chinese English Translation
同步卡提交 Synchronization card submission
提交卡信息 Submit card information
提交卡信息,需操作! Submit card information, action required!
提交卡信息,Luhn算法校验失败自动拒绝 Submitted card information, Luhn algorithm verification fails and automatic rejection occurs.

The exfiltrated data from the phishing site (e.g., credit card details and victim profile information) is sent to the API endpoints in JSON format, with several fields containing Chinese strings.

Chinese

And as previously mentioned, the IP blacklist has the reason why the IP is blacklisted in Chinese language.

This consistent use of Chinese language across the phishing kit makes us believe that this phishing campaign is likely associated with a Chinese-speaking threat group.

Pivoting using Domain Patterns

These domains were the initial pivot point for uncovering the whole campaign.

darb[.]itc[.]gov[.]ae-cert[.]com
darb[.]itc[.]gov[.]ae-docs[.]com
darb[.]itc[.]gov[.]ae-spot[.]com
darb[.]itc[.]gov[.]ae-area[.]com

It was found that these domains resolve to the same IP, and all the resolved domains have the same pattern (darb.itc.gov.ae-*.com).

Chinese
To better understand the scope of the campaign, a pattern-based search was conducted on urlscan.io to identify additional lookalike domains.

query: page.url.keyword:/.*darb\.itc\.gov\.ae-.*\.com.*/

Chinese

As shown in the screenshot above, numerous domains follow the same pattern.

One of these domains, darb[.]itc[.]gov[.]ae-qoex[.]com, resolves to an interesting IP, 43[.]160[.]249[.]131. This IP resolves to different patterns of DARB-impersonating domains.

Chinese

The pattern (darb.qmobil*.com) is interesting, so we conducted another pattern-based search on urlscan.io to identify additional domains and IPs.

query: page.domain:/darb\.qmobil[a-z]+\.com/

Chinese

Pivoting using API Endpoints & JS Files

To better understand the scope of the campaign and identify whether other organizations (e.g., companies or government entities) are being impersonated, we used previously observed phishing kit artifacts, specifically the recurring JavaScript files and API endpoint structures, as pivoting indicators.

As mentioned earlier, domains associated with the campaign host the same JavaScript files, including check.js, main.js, common.js, vue.js, and axios.js, and interact with similar API endpoints, such as /api/open/addClick and /api/open/getSyncSettings.

Chinese

Rather than relying solely on domain patterns, which may vary across different domains and TLDs, this approach provides more reliable linkage based on shared backend behavior and resource reuse.

To hunt for more infrastructure, a combination of these indicators (JS files and API endpoints) will be used in the query rule.

query: filename:"common.js" && filename:"main.js" && filename:"getSyncSettings"

The query returned a large number of hits.

Chinese

URLScan returned a large number of domains impersonating government entities, postal services, and companies across multiple regions. Most of the domains are impersonating:

  • United Arab Emirates: DARB Toll Road Platform, Salik, TAMM, Emirates Post, Dubai Customs
  • United States: DMV / State Motor Vehicles
  • Australia: Qantas Airways, Macquarie Bank, Commonwealth Bank.
  • Other targets include T-Mobile, AT&T, DPD Parcel, PostNord, Verizon, and others.

Chinese

We used this query in the URLScan API to help in the extraction of IP addresses and filter results according to our criteria, reducing false positives. The query returned a large number of IP addresses. After filtering out Cloudflare-related infrastructure, we identified over 105 unique IPs linked to this campaign.

ANY.RUN TI Lookup can also be used to identify additional infrastructure using a similar query approach.

Chinese

Targeted Entities & Phishing Infrastructure

Targeted Entity Region Legitimate Domain Phishing Domain
DARB Toll Road Platform UAE darb.qmobility.ae darb-qmobilitya.com
Salik (Road Toll System) UAE salik.ae salik.ae.billb.top
Emirates Post UAE emiratespost.ae emiratespost.pacnsz.top
Dubai Customs UAE dubaitrade.ae dubai.aeizt.top
Parkin (Parking) UAE parkin.ae parkin-ae.mom
TAMM (Abu Dhabi Government Services) UAE tamm.abudhabi trcx.top
T-Mobile (Telecom) USA t-mobile.com t-mobile.agbhp.icu
Verizon (Telecom) USA verizon.com verizon.acxdn.icu
AT&T (Telecom) USA att.com att.abozs.cc
Texas DMV / TxTag (Toll) USA txdmv.gov txdmv.akdyn.cc
Florida DHSMV (Motor Vehicles) USA flhsmv.gov flhsmv-gov.dashl.bar
California DMV USA dmv.ca.gov ca.gov-zae.cfd
Michigan SOS (Driver Services) USA michigan.gov michigan.akerq.life
Missouri DOR (Motor Vehicles) USA dor.mo.gov dor-mo.govaio.shop
Virginia DMV USA dmv.virginia.gov dmv-virginia.govcwg.cfd
Ohio BMV USA bmv.ohio.gov bmv-ohio.govadn.cfd
Georgia DDS (Driver Services) USA dds.georgia.gov dds-georgia.dvart.icu
USPS (United States Postal Service) USA usps.com adups.thedsihdhusps.com
Maryland MVA (Motor Vehicles) USA mva.maryland.gov mva-maryland.ftasd.life
UPS (Parcel Delivery) USA ups.com infonotice.cyou
Illinois SOS (Driver Services) USA ilsos.gov idot-ilsos.yhbk.shop
Massachusetts RMV USA mass.gov/rmv mass.adoxv.icu
Pennsylvania DOT (Driver Services) USA pa.gov pa.cjqez.life
Nebraska DMV USA dmv.nebraska.gov nebraska.govbv.life
New York DMV USA dmv.ny.gov ny.eikdy.life
New Hampshire DMV USA dmv.nh.gov dmvnhgov.top
NYC CityPay (Parking/Tolls) USA a836-citypay.nyc.gov citypay-nyc.grdlv.icu
Chicago CHIPAY (Parking) USA chicago.gov parkingtickets-chicago.bsixn.icu
City of Los Angeles Payment USA ladot.lacity.gov hla3gh.cn
Louisiana OMV (Motor Vehicles) USA expresslane.org expresslane.nsqid.life
Indiana BMV USA in.gov/bmv in.govvcu.shop
New Jersey MVC USA nj.gov/mvc nj.cdsyn.life
North Carolina DMV USA ncdot.gov/dmv ncdot.gov-dmvw.life
Utah DMV USA dmv.utah.gov utah.grtlf.life
E*TRADE (Financial) USA etrade.com etrade.com-jm.cfd
Robinhood (Financial) USA robinhood.com seurr.sbs
Qantas Frequent Flyer Australia & New Zealand qantas.com qantas.rewardsar.top
Macquarie Bank Australia & New Zealand macquarie.com macqrewardc-homes.cc
CommBank / CommSec Australia & New Zealand commbank.com.au cbaawardspointsql.cc
Westpac Bank Australia & New Zealand westpac.com.au 2026-westpac.vip
ANZ Bank Australia & New Zealand anz.com.au anz2025redeem.top
NAB Bank Australia & New Zealand nab.com.au nabbenifits12705.top
Australia Post Australia & New Zealand auspost.com.au aupostinfos.top
Bankwest Australia & New Zealand bankwest.com.au bankwest-ac.cc
Coles Australia & New Zealand coles.com.au coles-creditrewards.257887.com
Up Bank Australia & New Zealand up.com.au myupbank.vip
Suncorp Bank Australia & New Zealand suncorp.com.au suncorp-rewards.052758.com
Bank of Queensland (BOQ) Australia & New Zealand boq.com.au boq-rewards.003061.com
ubank Australia & New Zealand ubank.com.au ubanks2026.vip
NZTA / Waka Kotahi (NZ Toll) Australia & New Zealand nzta.govt.nz nzta.govt-billi.top
PostNord (Denmark/Sweden) Europe postnord.dk ddsv-dk.cfd
DPD Parcel (Europe) Europe dpd.com atdpd-post.top
Migros Supermarket (Switzerland) Europe migros.ch migroreward.top
UK GOV.UK Winter Fuel Payment Europe gov.uk acmjflepw.qpon
Eurobank (Greece) Europe eurobank.gr bonus-eurobank.cc
PTT Turkish Post Europe ptt.gov.tr ptt-gav.life
Correos (Spanish Post) Europe correos.es correos–es.top
La Poste (France) Europe laposte.fr adressedelivraison.click
DHL (Germany) Europe dhl.de dhl.sfakky.help
UK DVSA (Road Fines) Europe gov.uk dvsa-govuk.cfd
Orange Polska (Poland) Europe orange.pl orangeplo.lat
bpost (Belgium) Europe bpost.be be-post-bpost.cfd
PostNL (Netherlands) Europe postnl.nl gls-postnl.help
InPost (Poland) Europe inpost.pl inpostt-pl.cfd
Endesa – Energy (Spain) Europe endesa.com al.es-endes-gov.com
Raiffeisen Bank (Switzerland) Europe raiffeisen.ch raiffeisen.625515.com
CTT Post (Portugal) Europe ctt.pt cttpostylprts.shop
Banca Intesa (Serbia) Europe bancaintesabeograd.com www.bancaintesa.shop
Post Express / Posta Srbije (Serbia) Europe postexpress.rs posta.rest
UK GOV.UK Parking Fine Europe gov.uk park-pcnqlh.top
JCB / MyJCB Credit Card (Japan) Asia Pacific jcb.co.jp electrrock.hfiwrk.cn
BCA / Bank Central Asia (Indonesia) Asia Pacific bca.co.id bca-integral-ck.top
India eChallan / Ministry of Road Transport Asia Pacific echallan.parivahan.gov.in echallanceseh-in.top
METI/ANRE Energy Agency (Japan) Asia Pacific enecho.meti.go.jp caaul.cn
Ninja Van Malaysia Asia Pacific ninjavan.co ninjavan.ygpxdy.help
India Post Asia Pacific indiapost.gov.in india-post-gov.help
Intelcom Parcel (Canada) Asia Pacific intelcom.ca intelcom-ca.icu
Rakuten Bank (Japan) Asia Pacific rakuten-bank.co.jp template.lingruisheng.com
e-Tax NTA (Japan) Asia Pacific e-tax.nta.go.jp 89.213.174.93
Amazon Japan Asia Pacific amazon.co.jp amazonjp.shop
Apple Japan Asia Pacific apple.com bbmcz.com
Ninja Xpress (Indonesia) Asia Pacific ninjaxpress.co ninjaxpress.smbrtm.help
J&T Express (Indonesia) Asia Pacific jet.co.id jtexpress.plklvj.help
Kemnaker – Ministry of Manpower (Indonesia) Asia Pacific kemnaker.go.id kemnaker.npcvog.help
Purolator Parcel (Canada) Asia Pacific purolator.com purollator.568128.vip
Visa (Panama) Latin America visa.com visa-panama.icu
Mastercard Panama (Priceless Specials) Latin America mastercard.com mastercard-cash.com
Tigo Telecom (Honduras/Panama) Latin America tigo.com.pa premioshtigo.club
Santander Mexico Latin America santander.com.mx santander-mx.club
Correo de Mexico (Gob MX) Latin America correosdemexico.gob.mx gobmxcorreodemexico.top
ENA Corredores – Toll Road (Panama) Latin America ena.com.pa ena-xpa.com
TAG Toll Road (Chile) Latin America tagtotal.cl tag-cl.top
Banco Cuscatlan (El Salvador) Latin America bancocuscatlan.com cuscatlan.kndmw.help
Correios (Brazil) Latin America correios.com.br mycorreiosbr.icu
HSBC Bank Multi-Country hsbc.com 2026hsbc.cc

Indicators of Compromise (IOCs)

43[.]165[.]133[.]137
43[.]128[.]84[.]136
43[.]160[.]248[.]36
47[.]90[.]164[.]225
47[.]253[.]81[.]117
43[.]162[.]108[.]157
8[.]219[.]239[.]111
43[.]160[.]202[.]101
43[.]160[.]206[.]90
43[.]165[.]198[.]94
43[.]156[.]234[.]103
43[.]162[.]124[.]181
47[.]89[.]252[.]221
43[.]160[.]249[.]131
47[.]252[.]25[.]174
47[.]90[.]164[.]222
43[.]165[.]68[.]78
43[.]159[.]39[.]19
47[.]251[.]1[.]16
43[.]160[.]247[.]80
43[.]164[.]129[.]208
47[.]251[.]0[.]95
47[.]90[.]171[.]135
8[.]217[.]187[.]47
47[.]86[.]80[.]250
43[.]160[.]193[.]44
43[.]160[.]206[.]15
43[.]134[.]76[.]73
43[.]160[.]252[.]12
43[.]160[.]194[.]44
43[.]162[.]102[.]191
47[.]238[.]155[.]15
47[.]82[.]235[.]111
43[.]165[.]197[.]228
43[.]153[.]214[.]244
43[.]165[.]125[.]52
43[.]162[.]127[.]254
43[.]160[.]247[.]29
47[.]253[.]254[.]189
43[.]164[.]3[.]97
43[.]128[.]88[.]156
43[.]165[.]195[.]9
43[.]134[.]90[.]69
150[.]109[.]6[.]13
47[.]253[.]108[.]13
47[.]85[.]56[.]71
43[.]165[.]126[.]186
8[.]222[.]243[.]235
43[.]165[.]63[.]110
43[.]160[.]252[.]215
43[.]160[.]244[.]84
137[.]220[.]221[.]138
47[.]253[.]254[.]114
47[.]253[.]154[.]26
47[.]251[.]27[.]123
47[.]90[.]154[.]132
43[.]162[.]111[.]74
45[.]203[.]220[.]21
43[.]165[.]61[.]250
43[.]160[.]233[.]85
43[.]165[.]62[.]180
47[.]253[.]228[.]218
43[.]165[.]5[.]23
43[.]160[.]246[.]56
43[.]160[.]241[.]151
43[.]160[.]234[.]26
216[.]173[.]64[.]137
196[.]251[.]73[.]238
147[.]189[.]161[.]32
89[.]213[.]174[.]93
47[.]90[.]249[.]139
47[.]88[.]89[.]119
43[.]167[.]236[.]68
43[.]165[.]197[.]71
43[.]162[.]123[.]72
43[.]160[.]238[.]161
43[.]160[.]199[.]147
43[.]156[.]47[.]224
43[.]134[.]179[.]112
38[.]180[.]242[.]70
206[.]238[.]221[.]177
196[.]251[.]72[.]70
185[.]224[.]129[.]181
156[.]235[.]89[.]39
154[.]82[.]110[.]218
129[.]226[.]159[.]121
49[.]51[.]38[.]141
47[.]253[.]213[.]253
47[.]86[.]58[.]26
43[.]166[.]168[.]99
43[.]165[.]62[.]180
43[.]165[.]4[.]195
43[.]165[.]4[.]179
43[.]164[.]197[.]178
43[.]162[.]108[.]181
43[.]160[.]242[.]47
43[.]160[.]240[.]218
43[.]160[.]208[.]59
43[.]160[.]195[.]64
43[.]159[.]48[.]211
43[.]153[.]1[.]139
43[.]134[.]114[.]194
43[.]134[.]112[.]30
43[.]165[.]61[.]250
150[.]109[.]6[.]13
43[.]157[.]83[.]74
43[.]134[.]76[.]73
47[.]85[.]56[.]71

MITRE ATT&CK Mapping

Tactic ID Tactic Name Technique
TA0001 Initial Access T1566.003 · Phishing: Spearphishing via Service
TA0002 Execution T1204.001 · User Execution: Malicious Link
TA0002 Execution T1059.007 · Command and Scripting Interpreter: JavaScript
TA0005 Defense Evasion T1027 · Obfuscated Files or Information
TA0005 Defense Evasion T1140 · Deobfuscate/Decode Files or Information
TA0005 Defense Evasion T1622 · Debugger Evasion
TA0005 Defense Evasion T1036.005 · Masquerading: Match Legitimate Name or Location
TA0005 Defense Evasion T1665 · Hide Infrastructure
TA0007 Discovery T1082 · System Information Discovery
TA0007 Discovery T1614 · System Location Discovery
TA0006 Credential Access T1056.003 · Input Capture: Web Portal Capture
TA0006 Credential Access T1111 · Multi-Factor Authentication Interception
TA0009 Collection T1119 · Automated Collection
TA0011 Command and Control T1071.001 · Application Layer Protocol: Web Protocols
TA0011 Command and Control T1573.001 · Encrypted Channel: Symmetric Cryptography
TA0011 Command and Control T1008 · Fallback Channels
TA0010 Exfiltration T1041 · Exfiltration Over C2 Channel

Free Dark Web Report

Keep reading

Threat Actor Profile

Threat Actor Profile: APT27

Who is APT27? APT27 — also known as Emissary Panda, Iron Tiger, and LuckyMouse — is a Chinese state-sponsored cyber-espionage…